派博傳思國際中心

標(biāo)題: Titlebook: Computer and Information Sciences; 31st International S Tadeusz Czachórski,Erol Gelenbe,Ricardo Lent Conference proceedings‘‘‘‘‘‘‘‘ 2016 Th [打印本頁]

作者: 憑票入場    時間: 2025-3-21 16:06
書目名稱Computer and Information Sciences影響因子(影響力)




書目名稱Computer and Information Sciences影響因子(影響力)學(xué)科排名




書目名稱Computer and Information Sciences網(wǎng)絡(luò)公開度




書目名稱Computer and Information Sciences網(wǎng)絡(luò)公開度學(xué)科排名




書目名稱Computer and Information Sciences被引頻次




書目名稱Computer and Information Sciences被引頻次學(xué)科排名




書目名稱Computer and Information Sciences年度引用




書目名稱Computer and Information Sciences年度引用學(xué)科排名




書目名稱Computer and Information Sciences讀者反饋




書目名稱Computer and Information Sciences讀者反饋學(xué)科排名





作者: 外星人    時間: 2025-3-21 22:48
Brandon P. Brown,Jason T. Eberl Ph.D, it is often a time-consuming task and needs to be performed under a restricted computational budget. In this study, the results from our previous work on using the Taguchi method to tune the parameters of a memetic algorithm for cross-domain search are further analysed and extended. Although the T
作者: 慢慢沖刷    時間: 2025-3-22 02:03
Brandon P. Brown,Jason T. Eberl Ph.Dnce is a crucial component of selection hyper-heuristics, deciding whether to accept or reject a new solution at each step during the search process. This study investigates group decision making strategies as ensemble methods exploiting the strengths of multiple move acceptance methods for improved
作者: Fallibility    時間: 2025-3-22 05:30

作者: myopia    時間: 2025-3-22 12:25

作者: Compassionate    時間: 2025-3-22 14:51

作者: Compassionate    時間: 2025-3-22 20:26

作者: 使成波狀    時間: 2025-3-23 00:38

作者: Culmination    時間: 2025-3-23 04:32
The Ethics of Information Warfareand evaluation based on specially created test datasets. Sometimes preparation of test sets can be troublesome. Another problem appears when discretization of input sets is taken into account. It is not obvious how to discretize test datasets. Therefore model evaluation method not requiring test set
作者: VALID    時間: 2025-3-23 06:49
Luciano Floridi,Mariarosaria Taddeolity issues mainly due to the evaluation of large search spaces. Evaluation of the search space cosists translating candidate concept descriptor into SQL queries, which involve a number of equijoins on several tables, and running them against the dataset. We aim to improve time efficiency of such sy
作者: averse    時間: 2025-3-23 12:11

作者: 暴露他抗議    時間: 2025-3-23 17:48

作者: 幸福愉悅感    時間: 2025-3-23 21:54
Farm Animal Welfare: A Systemic Challenge, from the environment at random rates. These packets can be stored in node buffers as discrete packet forms which were previously introduced in “Energy Packet Network” paradigm. We consider a standby energy loss in the energy buffer (battery or capacitor) in a random rate, due to the fact that energ
作者: 逗它小傻瓜    時間: 2025-3-24 01:51
https://doi.org/10.1007/978-1-4020-8722-6networks with a restart signal, multiple classes or positive customers, PS discipline and arbitrary PH service distribution. The restart signal models the possibility to abort a task and send it again after changing its class and its service distribution. These networks have been proved to have a pr
作者: fledged    時間: 2025-3-24 03:22

作者: 1分開    時間: 2025-3-24 08:13
Computer and Information Sciences978-3-319-47217-1Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: Trochlea    時間: 2025-3-24 14:18

作者: SPALL    時間: 2025-3-24 17:12
https://doi.org/10.1007/978-3-031-07183-6 a testbed for the algorithmic stochastic comparisons of stochastic matrices and Markov chains, is now a general purpose framework which can be used for the Markovian modelling in education and research.
作者: 忍受    時間: 2025-3-24 19:14
https://doi.org/10.1007/978-3-319-47217-1algorithms; artificial intelligence; computer networks; computer science; evolutionary algorithms; geneti
作者: 勉強    時間: 2025-3-25 01:23
978-3-319-47216-4The Editor(s) (if applicable) and The Author(s) 2016
作者: 蔓藤圖飾    時間: 2025-3-25 04:24
Tadeusz Czachórski,Erol Gelenbe,Ricardo LentIncludes supplementary material:
作者: 連接    時間: 2025-3-25 10:40
Communications in Computer and Information Sciencehttp://image.papertrans.cn/c/image/234371.jpg
作者: 座右銘    時間: 2025-3-25 15:06
Some Applications of Multiple Classes G-Networks with Restartnetworks with a restart signal, multiple classes or positive customers, PS discipline and arbitrary PH service distribution. The restart signal models the possibility to abort a task and send it again after changing its class and its service distribution. These networks have been proved to have a product form steady-state distribution.
作者: MEAN    時間: 2025-3-25 17:14

作者: 繁忙    時間: 2025-3-25 20:35
1865-0929 tion Sciences, ISCIS 2016, held in Krakow, Poland, in October 2016...The?29 revised full papers presented were carefully reviewed and selected from 65 submissions. The papers are organized in topical sections on?smart algorithms;?data classification and processing;?stochastic modelling;?performance
作者: atrophy    時間: 2025-3-26 03:44
Brandon P. Brown,Jason T. Eberl Ph.DThis study investigates group decision making strategies as ensemble methods exploiting the strengths of multiple move acceptance methods for improved performance. The empirical results indicate the success of the proposed methods across six combinatorial optimisation problems from a benchmark as well as an examination timetabling problem.
作者: Abrade    時間: 2025-3-26 05:27

作者: miniature    時間: 2025-3-26 08:55
SpringerBriefs in Environmental Sciencees of faults. We performed an evaluation with an industrial case study from the telecommunications domain. We were able to detect real faults with checkers that were generated based on the analysis of execution logs.
作者: 北極人    時間: 2025-3-26 16:25
Caterina Metaxotou,Ariadni Mavrou ability. Our proposed algorithm can be considered as one of the best performing algorithms with its 66 times faster computation speed that enables to explore the search space more effectively than any of its counterparts.
作者: archetype    時間: 2025-3-26 18:06

作者: Gudgeon    時間: 2025-3-27 00:08
https://doi.org/10.1007/978-3-319-04135-3arning algorithm to classify a new android malware. We extract a fairly adequate set of malware features and we evaluate a machine learning based classification method. The runtime model is built and it can be implemented to detect variants of an android malware. The metrics illustrate the effectiveness of the proposed classification method.
作者: 觀點    時間: 2025-3-27 04:44

作者: 無聊點好    時間: 2025-3-27 08:47

作者: 微塵    時間: 2025-3-27 13:26
A Novel Multi-criteria Inventory Classification Approach: Artificial Bee Colony Algorithm with VIKORhe objective function. The results of our proposed approach were obtained from a widely used data set in the literature, and outperforms the existing classification models from the literature, by obtaining better inventory cost.
作者: angina-pectoris    時間: 2025-3-27 17:28
Android Malware Classification by Applying Online Machine Learningarning algorithm to classify a new android malware. We extract a fairly adequate set of malware features and we evaluate a machine learning based classification method. The runtime model is built and it can be implemented to detect variants of an android malware. The metrics illustrate the effectiveness of the proposed classification method.
作者: Hyperalgesia    時間: 2025-3-27 20:03

作者: 集聚成團    時間: 2025-3-28 01:05

作者: Contracture    時間: 2025-3-28 05:46
The Ethics of Energy Sustainabilityeferences. Our ISA tracks the user’s preferences and makes a selection on the output of one or more search engines using the preferences that it has learned. We also introduce a “relevance metric” to compare the performance of our Intelligent Search Assistant against a few search engines, showing that it provides better performance.
作者: 爭吵    時間: 2025-3-28 09:25
The Ethics of Information Warfarequality of prepared decision system. The set of classifiers was selected and different discretization algorithms were applied to obtain method invariant outcomes. The comparative results of experiments performed using cross-validation and test sets approaches to system evaluation, and conclusions are presented.
作者: 刺耳    時間: 2025-3-28 10:50

作者: covert    時間: 2025-3-28 18:34
Information Warfare and Just War Theorys, and there are other areas in which important deficiencies exist as well. We point out those discovered deficiencies, and propose remedies for them, laying the foundation for a more tractable and useful formalism for specifying semantic web services.
作者: anchor    時間: 2025-3-28 21:23
An Adaptive Heuristic Approach for the Multiple Depot Automated Transit Network Problemtic approach as the proposed problem is NP-Hard. Experiments are run on a carefully generated instances based on the works from the literature. The numerical results show that the proposed algorithm is competitive as it founds a small gap relative to a lower bound values from the literature.
作者: 熱情贊揚    時間: 2025-3-28 23:00

作者: 消音器    時間: 2025-3-29 05:31
Comparison of Cross-Validation and Test Sets Approaches to Evaluation of Classifiers in Authorship Aquality of prepared decision system. The set of classifiers was selected and different discretization algorithms were applied to obtain method invariant outcomes. The comparative results of experiments performed using cross-validation and test sets approaches to system evaluation, and conclusions are presented.
作者: 規(guī)范要多    時間: 2025-3-29 10:40

作者: 嚴(yán)厲譴責(zé)    時間: 2025-3-29 13:07
A Critical Evaluation of Web Service Modeling Ontology and Web Service Modeling Languages, and there are other areas in which important deficiencies exist as well. We point out those discovered deficiencies, and propose remedies for them, laying the foundation for a more tractable and useful formalism for specifying semantic web services.
作者: Volatile-Oils    時間: 2025-3-29 16:21

作者: NIL    時間: 2025-3-29 20:55
Conference proceedings‘‘‘‘‘‘‘‘ 2016opical sections on?smart algorithms;?data classification and processing;?stochastic modelling;?performance evaluation; queuing systems; wireless networks and security;?image processing and computer vision..
作者: Emasculate    時間: 2025-3-29 23:56
1865-0929 submissions. The papers are organized in topical sections on?smart algorithms;?data classification and processing;?stochastic modelling;?performance evaluation; queuing systems; wireless networks and security;?image processing and computer vision..978-3-319-47216-4978-3-319-47217-1Series ISSN 1865-0929 Series E-ISSN 1865-0937
作者: 雄辯    時間: 2025-3-30 06:37

作者: GRIEF    時間: 2025-3-30 10:11
An Adaptive Heuristic Approach for the Multiple Depot Automated Transit Network Problemice. Within this context of ATN, this study tries to deal with a specific routing problem arising in the context of a ATN’s network with a multiple depot topology. More specifically, we present an optimization routing model for automated transit networks which can be used to strategically evaluate d
作者: 真繁榮    時間: 2025-3-30 13:16
An Analysis of the Taguchi Method for Tuning a Memetic Algorithm with Reduced Computational Time Bud, it is often a time-consuming task and needs to be performed under a restricted computational budget. In this study, the results from our previous work on using the Taguchi method to tune the parameters of a memetic algorithm for cross-domain search are further analysed and extended. Although the T
作者: Radiculopathy    時間: 2025-3-30 16:51
Ensemble Move Acceptance in Selection Hyper-heuristicsnce is a crucial component of selection hyper-heuristics, deciding whether to accept or reject a new solution at each step during the search process. This study investigates group decision making strategies as ensemble methods exploiting the strengths of multiple move acceptance methods for improved
作者: GROUP    時間: 2025-3-31 00:34
Extending Static Code Analysis with Application-Specific Rules by Analyzing Runtime Execution Tracescation of these rules. However, such rules are usually not documented explicitly. Moreover, the implementation of specialized checkers is a manual process that requires expertise. In this work, application-specific programming rules are automatically extracted from execution traces collected at runt
作者: congenial    時間: 2025-3-31 01:19
The Random Neural Network Applied to an Intelligent Search Assistantre influenced by the users’ own ambiguity in formulating their requests or queries as well as by the commercial interest of Web search engines and Internet users that want to reach a wider audience. This paper presents an Intelligent Search Assistant (ISA) based on a Random Neural Network that acts
作者: Tonometry    時間: 2025-3-31 06:57
A Novel Grouping Genetic Algorithm for the One-Dimensional Bin Packing Problem on GPUnumber of bins. Large problem instances of the 1D-BPP cannot be solved exactly due to the intractable nature of the problem. In this study, we propose an efficient Grouping Genetic Algorithm (GGA) by harnessing the power of the Graphics Processing Unit (GPU) using CUDA. The time consuming crossover




歡迎光臨 派博傳思國際中心 (http://www.pjsxioz.cn/) Powered by Discuz! X3.5
三原县| 洛南县| 南平市| 曲周县| 台山市| 微山县| 桃江县| 同心县| 澄迈县| 微山县| 泾川县| 阿拉善右旗| 盐源县| 安远县| 英山县| 山阴县| 河间市| 望城县| 海门市| 静宁县| 乐山市| 嘉峪关市| 内黄县| 荣成市| 密云县| 娄烦县| 沂水县| 青海省| 三门峡市| 冷水江市| 临沭县| 库车县| 富源县| 文昌市| 晋中市| 枣阳市| 肃南| 慈利县| 山阳县| 互助| 乐亭县|